Secure hierarchical fog computing-based architecture for industry 5.0 using an attribute-based encryption scheme

被引:23
|
作者
Shruti [1 ,2 ]
Rani, Shalli [2 ]
Srivastava, Gautam [3 ,4 ,5 ]
机构
[1] Goswami Ganesh Dutta Sanatan Dharma Coll, Chandigarh, India
[2] Chitkara Univ, Chitkara Univ Inst Engn & Technol, Rajpura, Punjab, India
[3] Lebanese Amer Univ, Dept Comp Sci & Math, Beirut 1102, Lebanon
[4] China Med Univ, Res Ctr Interneural Comp, Taichung 40402, Taiwan
[5] Brandon Univ, Dept Math & Comp Sci, Brandon, MB R7A 6A9, Canada
关键词
Industry; 5.0; Smart industry; Fog computing; Internet of things (IoT); Sensors; Smart energy supply system; SMART CITIES; IOT DATA; EDGE;
D O I
10.1016/j.eswa.2023.121180
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Industry 5.0 is an emerging phase in the industrial field where humans and the latest technologies work together to bring revolutionary changes to work processes. It is the future of the upcoming generation for smart city development. Operations and designing of smart systems for Industrial Internet of Things (IIoT) devices include various types of decision-making at different levels of domains. Highly complex systems have a huge number of variables and decision-making requirements which also needs real-time data gathering from IIoT devices. Fog computing performs a key role by locating IIoT devices close to its proximity and reducing the processing time in comparison to cloud computing for smart systems. It makes smart systems work in a secure, flexible and time-sensitive manner. The presence of sensors makes data-intensive analysis challenging in these systems but fog computing handles it all. Along with other challenges, security is also one of the concerns that can affect the overall system if compromised. The main objective of this article is to introduce hierarchical fog computing-based architecture for smart energy-supplying systems as a part of Industry 5.0. This architecture will be able to support a large number of infrastructural components and provide services efficiently. In this article, validation of the amount of data transmitted by IIoT devices to the cloud per second is done for three different cases: 1. The proposed four-layer fog computing architecture, 2. Fog architecture with only layer three layers with the rest of the computing on the cloud, 3. A traditional system with cloud computing. The proposed approach is validated over state of art approaches in terms of accuracy. Moreover, the security of the architecture is provided using the Attribute-based encryption (ABE) scheme, which ensures data confidentiality with minimum overhead.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Fully secure attribute-based broadcast encryption
    Sun, J. (oksunjin@xaut.edu.cn), 2012, Science Press (39):
  • [32] An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
    Wang, Shulan
    Zhou, Junwei
    Liu, Joseph K.
    Yu, Jianping
    Chen, Jianyong
    Xie, Weixin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) : 1265 - 1277
  • [33] Fully secure revocable attribute-based encryption
    Qian J.-L.
    Dong X.-L.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (4) : 490 - 496
  • [34] Batch Attribute-Based Encryption for Secure Clouds
    Yang, Chen
    Sun, Yang
    Wu, Qianhong
    INFORMATION, 2015, 6 (04) : 704 - 718
  • [35] Secure access privilege delegation using attribute-based encryption
    Panda, Suryakanta
    Mondal, Samrat
    Das, Ashok Kumar
    Susilo, Willy
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (05) : 1261 - 1276
  • [36] Secure access privilege delegation using attribute-based encryption
    Suryakanta Panda
    Samrat Mondal
    Ashok Kumar Das
    Willy Susilo
    International Journal of Information Security, 2023, 22 : 1261 - 1276
  • [37] Fully Secure Revocable Attribute-Based Encryption
    钱俊磊
    董晓蕾
    Journal of Shanghai Jiaotong University(Science), 2011, 16 (04) : 490 - 496
  • [38] Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
    Li, Ming
    Yu, Shucheng
    Zheng, Yao
    Ren, Kui
    Lou, Wenjing
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (01) : 131 - 143
  • [39] Secure Online/Offline Attribute-Based Encryption for IoT Users in Cloud Computing
    Li, Xiang
    Tian, Hui
    Ning, Jianting
    PROVABLE SECURITY, PROVSEC 2019, 2019, 11821 : 347 - 354
  • [40] A secure billing protocol over attribute-based encryption in vehicular cloud computing
    Nkenyereye, Lewis
    Park, Youngho
    Rhee, Kyung Hyune
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2016,